HomeSort by relevance Sort by last modified time
    Searched full:credential (Results 51 - 75 of 633) sorted by null

1 23 4 5 6 7 8 91011>>

  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/
NAIRealmData.java 6 import com.android.server.wifi.hotspot2.pps.Credential;
61 public int match(List<String> credLabels, Credential credential) {
82 int match = eapMethod.match(credential) | realmMatch;
  /system/tpm/attestation/common/
tpm_utility.h 35 // certificate or some other type of credential with the endorsement key. The
37 // owner privilege. The |identity_key_blob| is the key to which the credential
41 // populates the decrypted |credential|.
47 std::string* credential) = 0;
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/pps/
Credential.java 23 public class Credential {
47 public Credential(long ctime, long expTime, String realm, boolean checkAAACert,
75 public Credential(long ctime, long expTime, String realm, boolean checkAAACert,
76 EAPMethod eapMethod, Credential.CertType certType, byte[] fingerPrint) {
95 public Credential(long ctime, long expTime, String realm, boolean checkAAACert,
115 public Credential(Credential other, String password) {
132 public Credential(WifiEnterpriseConfig enterpriseConfig, KeyStore keyStore, boolean update)
282 Credential that = (Credential) o
    [all...]
HomeSP.java 43 private final Credential mCredential;
65 Credential credential) {
80 mCredential = credential;
98 Credential credential,
120 mCredential = credential;
308 public Credential getCredential() { return mCredential; }
369 ", Credential=" + mCredential +
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
Authenticate.java 34 String credential = Credentials.basic("jesse", "password1");
36 .header("Authorization", credential)
  /developers/build/prebuilts/gradle/DirectBoot/
README.md 16 - Credential protected:
23 Credential protected storage is unavailable (an direct boot aware component primarily relies on data stored in the new Device protected storage area,
24 but they may access Credential protected data when unlocked) by adding `directBootAware="true"` in the manifest.
31 Credential protected storage becomes available. The storage APIs on the Context supplied to these components will always point to Credential protected storage by default.
39 because the storage isn't protected by the user's credential (PIN/Pattern/Password)
  /developers/samples/android/security/DirectBoot/
template-params.xml 91 - Credential protected:
98 Credential protected storage is unavailable (an direct boot aware component primarily relies on data stored in the new Device protected storage area,
99 but they may access Credential protected data when unlocked) by adding `directBootAware="true"` in the manifest.
106 Credential protected storage becomes available. The storage APIs on the Context supplied to these components will always point to Credential protected storage by default.
114 because the storage isn't protected by the user's credential (PIN/Pattern/Password)
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/
old_run.py 82 storage: Storage, a ``Storage`` to store the credential in.
87 Credentials, the obtained credential.
153 credential = flow.step2_exchange(code, http=http)
157 storage.put(credential)
158 credential.set_store(storage)
161 return credential
tools.py 152 storage: Storage, a ``Storage`` to store the credential in.
160 Credentials, the obtained credential.
225 credential = flow.step2_exchange(code, http=http)
229 storage.put(credential)
230 credential.set_store(storage)
233 return credential
  /frameworks/base/services/core/java/com/android/server/
LockSettingsService.java 137 * The UIDs that are used for system credential storage in keystore.
149 void setCredential(String credential, String savedCredential, int userId)
151 byte[] toHash(String credential, int userId);
152 String adjustForKeystore(String credential);
157 // the user unlocks the account and credential-encrypted storage is available.
249 // We store a private credential for the managed user that's unlocked by the primary
250 // account holder's credential. As such, the user will never be prompted to enter this
296 * If the account is credential-encrypted, show notification requesting the user to unlock
826 CredentialHash credential; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
README-HS20 34 network block or credential. If a credential is picked (based on ANQP
40 whenever needed based on ANQP information and the credential.
48 will internally determine which network or credential is going to be
104 # credential block
106 # Each credential used for automatic network selection is configured as a set
110 # credential fields:
112 # temporary: Whether this credential is temporary and not to be saved
119 # network (based on either an enabled network block or a credential)
194 # points support authentication with this credential. This is a
    [all...]
  /libcore/ojluni/src/main/java/javax/security/auth/
Subject.java 65 * private cryptographic keys, are stored within a private credential
68 * within a public credential <code>Set</code>. Different permissions
69 * are required to access and modify the different credential Sets.
82 * Object credential;
84 * // add a Principal and credential to the Subject
86 * subject.getPublicCredentials().add(credential);
149 * To modify the public credential Set, the caller must have
151 * To modify the private credential Set, the caller must have
177 * To modify the public credential Set, the caller must have
179 * To modify the private credential Set, the caller must hav
    [all...]
  /external/jetty/src/java/org/eclipse/jetty/security/
PropertyUserStore.java 45 import org.eclipse.jetty.util.security.Credential;
159 Credential credential = Credential.getCredential(credentials); local
161 Principal userPrincipal = new KnownUser(username,credential);
164 subject.getPrivateCredentials().add(credential);
177 notifyUpdate(username,credential,roleArray);
305 * @param credential
308 private void notifyUpdate(String username, Credential credential, String[] roleArray
    [all...]
MappedLoginService.java 35 import org.eclipse.jetty.util.security.Credential;
155 * @param info a UserIdentity instance, or a String password or Credential instance
165 Credential credential = (info instanceof Credential)?(Credential)info:Credential.getCredential(info.toString()); local
167 Principal userPrincipal = new KnownUser(userName,credential);
170 subject.getPrivateCredentials().add(credential);
182 * @param credential The users Credential
    [all...]
  /external/dbus/dbus/
dbus-credentials.c 221 * Checks whether the given credential is present.
224 * @param type the credential to check for
225 * @returns #TRUE if the credential is present
243 _dbus_assert_not_reached ("Unknown credential enum value");
396 * Merge the given credential found in the second object into the first object,
397 * overwriting the first object's value for that credential.
399 * Does nothing if the second object does not contain the specified credential.
400 * i.e., will never delete a credential from the first object.
403 * @param which the credential to overwrite
  /frameworks/base/docs/html/training/articles/
direct-boot.jd 25 <li><i>Credential encrypted storage</i>, which is the default storage location
49 credentials, such as a PIN or password, use credential encrypted storage.
50 Credential encrypted storage is only available after the user has successfully
53 credential encrypted storage.</p>
86 device encrypted storage as well as credential encrypted storage.</p>
109 Direct Boot mode, use credential encrypted storage.</p>
114 accessing credential encrypted storage and use regular system services that
144 data between credential encrypted storage and device encrypted storage.</p>
146 <p>Use your best judgment when deciding what data to migrate from credential
  /frameworks/base/packages/Osu/src/com/android/anqp/eap/
EAPMethod.java 68 addAuthParam(new Credential(authInfoID, len, paramPayload));
71 addAuthParam(new Credential(authInfoID, len, paramPayload));
112 public int match(com.android.hotspot2.pps.Credential credential) {
114 EAPMethod credMethod = credential.getEAPMethod();
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/eap/
EAPMethod.java 69 addAuthParam(new Credential(authInfoID, len, paramPayload));
72 addAuthParam(new Credential(authInfoID, len, paramPayload));
113 public int match(com.android.server.wifi.hotspot2.pps.Credential credential) {
115 EAPMethod credMethod = credential.getEAPMethod();
  /developers/build/prebuilts/gradle/ConfirmCredential/
README.md 2 Android Confirm Credential Sample
40 <img src="screenshots/1-purchase.png" height="400" alt="Screenshot"/> <img src="screenshots/2-show-confirm-credential.png" height="400" alt="Screenshot"/> <img src="screenshots/3-already-authenticated.png" height="400" alt="Screenshot"/>
55 https://github.com/googlesamples/android-Confirm Credential
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/
auth_des.h 43 /* A credential */
73 adv_winverf is the credential window + 1.
88 /* Map a des credential into a unix cred. */
auth_unix.h 52 /* The machine name is part of a credential; it may not exceed 255 bytes */
55 /* gids compose part of a credential; there may not be more than 16 of them */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpc/
auth_des.h 43 /* A credential */
73 adv_winverf is the credential window + 1.
88 /* Map a des credential into a unix cred. */
auth_unix.h 52 /* The machine name is part of a credential; it may not exceed 255 bytes */
55 /* gids compose part of a credential; there may not be more than 16 of them */
  /system/connectivity/shill/vpn/
vpn_driver.cc 72 << "Property cannot be both an array and a credential";
102 bool credential = (properties_[i].flags & Property::kCredential); local
105 CHECK(!credential)
106 << "Property cannot be both an array and a credential";
115 (credential && !save_credentials)) {
120 if (credential) {
  /system/connectivity/shill/shims/protos/
crypto_util.proto 31 // This protobuf is for sending credential information from shill to the
32 // credential verification shim. The call will fail if public_key is empty

Completed in 1340 milliseconds

1 23 4 5 6 7 8 91011>>